exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-3209-01

Red Hat Security Advisory 2020-3209-01
Posted Jul 29, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3209-01 - The release of Red Hat AMQ Online 1.5.2 serves as a replacement for AMQ Online 1.5.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include XML injection and cross site request forgery vulnerabilities.

tags | advisory, vulnerability, csrf
systems | linux, redhat
advisories | CVE-2020-13692, CVE-2020-14319
SHA-256 | d53f4c95584a5321010758f4597001f52e3b2733be2f86f69434037c5d8129a3

Red Hat Security Advisory 2020-3209-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: AMQ Online 1.5.2 release and security update
Advisory ID: RHSA-2020:3209-01
Product: Red Hat JBoss AMQ
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3209
Issue date: 2020-07-29
Cross references: RHBA-2020:57503-01
CVE Names: CVE-2020-13692 CVE-2020-14319
====================================================================
1. Summary:

An update of the Red Hat OpenShift Container Platform 3.11 and 4.4/4.5
container images is now available for Red Hat AMQ Online.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The release of Red Hat AMQ Online 1.5.2 serves as a replacement for AMQ
Online 1.5.1, and includes bug fixes and enhancements, which are documented
in the Release Notes document linked in the References.

Security Fix(es):

* AMQ Online: CSRF in graphQL requests (CVE-2020-14319)

* postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
(CVE-2020-13692)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

The Red Hat OpenShift Container Platform 3.11 and 4.4/4.5 container images
provided by this update can be downloaded from the Red Hat Container
Registry at registry.access.redhat.com. Installation instructions for your
platform are available from https://access.redhat.com.

Dockerfiles and scripts should be amended either to refer to this new image
specifically, or to the latest image generally.

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

4. Bugs fixed (https://bugzilla.redhat.com/):

1852985 - CVE-2020-13692 postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
1854373 - CVE-2020-14319 amq-on: CSRF (in graphQL requests)

5. References:

https://access.redhat.com/security/cve/CVE-2020-13692
https://access.redhat.com/security/cve/CVE-2020-14319
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.amq.online&version=1.5.2
https://access.redhat.com/documentation/en-us/red_hat_amq/7.7/html/release_notes_for_amq_online_1.5_on_openshift/index

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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bs2Z
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close